Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(105)

Unified Diff: LayoutTests/crypto/ecdh-deriveBits-failures.html

Issue 754563003: Add LayoutTests for WebCrypto's ECDH algorithm. (Closed) Base URL: svn://svn.chromium.org/blink/trunk
Patch Set: rebase onto master Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: LayoutTests/crypto/ecdh-deriveBits-failures.html
diff --git a/LayoutTests/crypto/ecdh-deriveBits-failures.html b/LayoutTests/crypto/ecdh-deriveBits-failures.html
new file mode 100644
index 0000000000000000000000000000000000000000..07ee8f2c6d2ddb141f7a452fd5d8fac68416ce14
--- /dev/null
+++ b/LayoutTests/crypto/ecdh-deriveBits-failures.html
@@ -0,0 +1,95 @@
+<!DOCTYPE html>
+<html>
+<head>
+<script src="../resources/js-test.js"></script>
+<script src="resources/common.js"></script>
+</head>
+<body>
+<p id="description"></p>
+<div id="console"></div>
+
+<script>
+description("Tests bad inputs to ECDH's deriveBits()");
+
+jsTestIsAsync = true;
+
+var keyPairs = {
+ ecdh: {},
+ ecdsa: {}
+};
+
+// Generate some EC keys for ECDSA and ECDH.
+function createTestKeys() {
+ return crypto.subtle.generateKey({name: "ecdh", namedCurve: "P-256"}, true, ["deriveBits"]).then(function(result) {
+ keyPairs.ecdh.p256_1 = result;
+
+ return crypto.subtle.generateKey({name: "ecdh", namedCurve: "P-256"}, true, ["deriveBits"]);
+ }).then(function(result) {
+ keyPairs.ecdh.p256_2 = result;
+
+ return crypto.subtle.generateKey({name: "ecdh", namedCurve: "P-384"}, true, ["deriveBits"]);
+ }).then(function(result) {
+ keyPairs.ecdh.p384_1 = result;
+
+ return crypto.subtle.generateKey({name: "ecdsa", namedCurve: "P-256"}, true, ["sign"]);
+ }).then(function(result) {
+ keyPairs.ecdsa.p256_1 = result;
+ });
+}
+
+createTestKeys().then(function(result) {
+ // Bad algorithm parameter (no algorithm name or public key)
+ return crypto.subtle.deriveBits({}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (no public key)
+ return crypto.subtle.deriveBits({name: 'ecdh'}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (null)
+ return crypto.subtle.deriveBits(null, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (not an object)
+ return crypto.subtle.deriveBits(-1, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is null)
+ return crypto.subtle.deriveBits({name: 'ecdh', public: null}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is wrong type)
+ return crypto.subtle.deriveBits({name: 'ecdh', public: -1}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is wrong type)
+ return crypto.subtle.deriveBits({name: 'ecdh', public: "foo"}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is for wrong curve)
+ return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p384_1.publicKey}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is not a public key)
+ return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdh.p256_2.privateKey}, keyPairs.ecdh.p256_1.privateKey, 256);
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+
+ // Bad algorithm parameter (public key is for ECDSA).
+ return crypto.subtle.deriveBits({name: 'ecdh', public: keyPairs.ecdsa.p256_1.publicKey}, keyPairs.ecdh.p256_1.privateKey, {test: 3});
+}).then(failAndFinishJSTest, function(result) {
+ logError(result);
+}).then(finishJSTest, failAndFinishJSTest);
+
+</script>
+
+</body>
+</html>
« no previous file with comments | « LayoutTests/crypto/ecdh-deriveBits-expected.txt ('k') | LayoutTests/crypto/ecdh-deriveBits-failures-expected.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698